Blog

Hardening Your Cloud Environment Against DDoS

A DDoS (Distributed Denial of Service) attack seeks to exhaust resources in a given infrastructure (nowadays, mostly cloud-based systems), to hinder the operation of its services and applications.

There are different types of DDoS attacks. In volumetric assaults, the target becomes overloaded due to the sudden increase in traffic volume, disrupting it and preventing legitimate users from accessing the service.

more →

Blog

How the COVID-19 Pandemic Has changed IT & Security

While the COVID-19 pandemic has disrupted business models around the world, the adoption of modern application and cloud technologies continues to grow.

Here we are sharing a blog from our partners Sumo Logic. Their Continuous Intelligence Report provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts.

more →

Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →

Blog

Ransomware Attack Scenario at “Shoes-4-U” – How Would You React?

Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.

The Scenario

Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →